1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
|
# Copyright 1999-2004 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.3-r10.ebuild,v 1.8 2004/06/24 22:26:23 agriffis Exp $
IUSE="pam selinux nls"
inherit eutils libtool gnuconfig flag-o-matic
FORCE_SYSTEMAUTH_UPDATE="no"
SELINUX_PATCH="shadow-4.0.3-selinux.diff"
S="${WORKDIR}/${P}"
HOMEPAGE="http://shadow.pld.org.pl/"
DESCRIPTION="Utilities to deal with user accounts"
SRC_URI="ftp://ftp.pld.org.pl/software/shadow/old/${P}.tar.gz"
LICENSE="BSD"
SLOT="0"
KEYWORDS="~x86 ~amd64 ~ppc ~sparc ~alpha ~mips ~hppa ~ia64 ~ppc64"
DEPEND=">=sys-libs/cracklib-2.7-r3
pam? ( >=sys-libs/pam-0.75-r4 )
nls? ( sys-devel/gettext )
selinux? ( sys-libs/libselinux )"
RDEPEND=">=sys-libs/cracklib-2.7-r3
pam? ( >=sys-libs/pam-0.75-r4 )
selinux? ( sys-libs/libselinux )"
pkg_preinst() {
rm -f ${ROOT}/etc/pam.d/system-auth.new
}
src_unpack() {
unpack ${A}
cd ${S}
use selinux && epatch ${FILESDIR}/${SELINUX_PATCH}
if use pam; then
# Get su to call pam_open_session(), and also set DISPLAY and XAUTHORITY,
# else the session entries in /etc/pam.d/su never get executed, and
# pam_xauth for one, is then never used. This should close bug #8831.
#
# <azarah@gentoo.org> (19 Oct 2002)
epatch ${FILESDIR}/${P}-su-pam_open_session.patch-v2
# libmisc needs to link against pam and pam_misc, at least
# when built as a shared object. See bug 37725.
#
# <agriffis@gentoo.org> (09 Jan 2004)
epatch ${FILESDIR}/${P}-shared-needs-pam.patch
fi
# If su should not simulate a login shell, use '/bin/sh' as shell to enable
# running of commands as user with /bin/false as shell, closing bug #15015.
#
# <azarah@gentoo.org> (23 Feb 2003)
# This one could be a security hole ...
# cd ${S}; epatch ${FILESDIR}/${P}-nologin-run-sh.patch
# Patch the useradd manpage to be a bit more clear, closing bug #13203.
# Thanks to Guy <guycad@mindspring.com>.
epatch ${FILESDIR}/${P}-useradd-manpage-update.patch
}
src_compile() {
# Allows shadow configure detect mips systems properly
gnuconfig_update
elibtoolize
local myconf=""
use pam \
&& myconf="${myconf} --with-libpam --with-libcrack" \
|| myconf="${myconf} --without-libpam"
./configure --disable-desrpc \
--with-libcrypt \
--with-libcrack \
--enable-shared=yes \
--enable-static=yes \
--host=${CHOST} \
`use_enable nls` \
${myconf} || die "bad configure"
# Parallel make fails sometimes
emake -j1 || die "compile problem"
}
src_install() {
dodir /etc/default /etc/skel
make prefix=${D}/usr \
exec_prefix=${D} \
mandir=${D}/usr/share/man \
install || die "install problem"
# Do not install this login, but rather the one from
# pam-login, as this one have a serious root exploit
# with pam_limits in use.
use pam && rm ${D}/bin/login
mv ${D}/lib ${D}/usr
dosed "s:/lib':/usr/lib':g" /usr/lib/libshadow.la
dosed "s:/lib/:/usr/lib/:g" /usr/lib/libshadow.la
dosed "s:/lib':/usr/lib':g" /usr/lib/libmisc.la
dosed "s:/lib/:/usr/lib/:g" /usr/lib/libmisc.la
dosym /usr/bin/newgrp /usr/bin/sg
dosym /usr/sbin/useradd /usr/sbin/adduser
dosym /usr/sbin/vipw /usr/sbin/vigr
# Remove dead links
rm -f ${D}/bin/{sg,vipw}
insinto /etc
# Using a securetty with devfs device names added
# (compat names kept for non-devfs compatibility)
insopts -m0600 ; doins ${FILESDIR}/securetty
insopts -m0600 ; doins ${S}/etc/login.access
insopts -m0644 ; doins ${S}/etc/limits
# needed for 'adduser -D'
insinto /etc/default
insopts -m0600
doins ${FILESDIR}/default/useradd
# From sys-apps/pam-login now
# insopts -m0644 ; doins ${FILESDIR}/login.defs
if [ `use pam` ] ; then
insinto /etc/pam.d ; insopts -m0644
for x in ${FILESDIR}/pam.d/*
do
[ -f ${x} ] && doins ${x}
done
cd ${FILESDIR}/pam.d
# Make sure /etc/pam.d/system-auth is the new version ..
mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
newins system-auth-1.1 system-auth.new || die
newins shadow chage
newins shadow chsh
newins shadow chfn
newins shadow useradd
newins shadow groupadd
fi
cd ${S}
# The manpage install is beyond my comprehension, and
# also broken. Just do it over.
rm -rf ${D}/usr/share/man/*
rm -f man/id.1 man/getspnam.3 man/passwd.5
for x in man/*.[0-9]
do
[ -f ${x} ] && doman ${x}
done
if [ ! `use pam` ] ; then
# Dont install the manpage, since we dont use
# login with shadow
rm -f ${D}/usr/share/man/man1/login.*
# We use pam, so this is not applicable.
rm -f ${D}/usr/share/man/man5/suauth.*
fi
cd ${S}/doc
dodoc ANNOUNCE INSTALL LICENSE README WISHLIST
docinto txt
dodoc HOWTO LSM README.* *.txt
# Fix sparc serial console
if [ "${ARCH}" = "sparc" ]
then
# ttyS0 and its devfsd counterpart (Sparc serial port "A")
dosed 's:\(vc/1\)$:tts/0\n\1:' /etc/securetty
dosed 's:\(tty1\)$:ttyS0\n\1:' /etc/securetty
fi
# fix hppa serial console
if [ "${ARCH}" = "hppa" ]
then
# ttyB0 is the PDC software console
dosed 's:\(vc/1\)$:tts/0\n\1:' /etc/securetty
dosed 's:\(tty1\)$:ttyS0\n\1:' /etc/securetty
dosed 's:\(tty1\)$:ttyB0\n\1:' /etc/securetty
fi
}
pkg_postinst() {
use pam || return 0;
local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
then
ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
ewarn "is being updated automatically. Your old "
ewarn "system-auth will be backed up as:"
ewarn
ewarn " ${ROOT}etc/pam.d/system-auth.bak"
echo
cp -a ${ROOT}/etc/pam.d/system-auth \
${ROOT}/etc/pam.d/system-auth.bak;
mv -f ${ROOT}/etc/pam.d/system-auth.new \
${ROOT}/etc/pam.d/system-auth
rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
else
rm -f ${ROOT}/etc/pam.d/system-auth.new
fi
}
|